ComputingRevision.net

Cybersecurity Quiz

Click the purple circle to select your answer

Question 1

Which social engineering technique involves creating a fabricated scenario to trick a victim into divulging information or performing an action?

Blagging
Hacking
Malware
Phishing

Question 2

What do cash machines usually have to help you avoid shoulder surfers?

Alarms
Mirrors
Keypads
Card readers

Question 3

Which type of attack tries every combination of characters to work-out your passcode?

Brute force
Trojan horse
Penetration testing
Hacking

Question 4

What is a worm?

Malware that spreads across networks without needing a host file
A type of computer cable
A tool for creating animations
A type of insect

Question 5

Which of the following is a common tell-tale sign of a social engineering attempt in an email?

Using the user's real name
Poor spelling and grammar
A padlock on the email
A high-quality logo

Question 6

Which type of attack tries every combination of characters to work-out your passcode?

Brute force
Hacking
Trojan horse
Penetration testing

Question 7

Which type of hacker acts maliciously?

Grey hat hacker
Black hat hacker
Red hat hacker
White hat hacker

Question 8

Which of the following is a common tell-tale sign of a social engineering attempt in an email?

A link to a reputable company website
A well-formatted email with no spelling errors
A request for personal information or credentials
A professional greeting and signature

Question 9

Why might someone create malware?

To improve download speeds
For freeing-up space on your device
To steal data
To test the performance of your computer

Question 10

What is the maximum prison sentence for hacking?

20 years
5 years
10 years
15 years